1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrews [41]
3 years ago
12

Which of the following is a sigh that your computer may have been infected with malicious code

Computers and Technology
1 answer:
taurus [48]3 years ago
4 0

Slow computer, blue screen, Programs opening and closing automatically, Lack of storage space, Suspicious modem and hard drive activity, Pop-ups, websites, toolbars and other unwanted programs, or spam.

You might be interested in
A startup is developing a new web browser with a focus on accessibility for visually impaired users. The startup founder is cons
gavmur [86]

Answer:

A license that allows developers to change and share the source

code of the licensed software

Explanation:

i learned this, btw brainly stop removing my answers

7 0
2 years ago
An online game is played with two dice. In this context, explain what is meant by decomposition.
Vlad [161]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about desinging a game that is played with two dice and gets or shows their value to the player.

The dice value is random, and it can be between one and six. So, you need to generate two numbers between 1 and 6. You may also need to display the numbers

The main part of this program is that you need to know the numbers to limit or restrict what the user may do next while playing.

That's most of the first level of decomposition for solving a problem. In decomposition, you need to keep decomposing (breaking) the problem into smaller pieces, thinking outline of the program and deciding what objects, functions, variables, and logic you're going to implement in the coding.

4 0
3 years ago
Give an example of an embedded systems application.
Gala2k [10]

Answer:

A clock in the mobile phone

Explanation:

a clock is a computer in a mobile phone which is a computer,hence it's a computer in a computer

7 0
3 years ago
1) Limitations imposed by scientific principles or limited resources are called?
STALIN [3.7K]
D because it has limitations or <em><u>constraints</u></em><u /> 
D again because communication technology is used for all of these things.
Sender, Message, Receiver, Feedback
It can cause the system to conform to situations.
If they don't know the properties then they could damage their equipment or the project by misusing it.
Solids, Liquids, Gasses, Plasma, and Bose-Einstein condesates

5 0
2 years ago
Write a fragment of code that will read words from the keyboard until the word done is entered. For each word except done, repor
hram777 [196]

Answer:

a)

Scanner keyboard = new Scanner(System.in);

System.out.println("Enter a word");

String word = keyboard.next();

while(!word.equals("done"))

{

if(word.charAt(0) == word.charAt(word.length() - 1))

{

System.out.println("First and last character are equals for the word: " + word);

}

else

{

System.out.println("First and last character are NOT equals for the word: " + word);

}

word = keyboard.next();

}

b)

Scanner keyboard = new Scanner(System.in);

System.out.println("Enter a word");

String word = keyboard.next();

do

{

if(word.charAt(0) == word.charAt(word.length() - 1))

{

System.out.println("First and last character are equals for the word: " + word);

}

else

{

System.out.println("First and last character are NOT equals for the word: " + word);

}

word = keyboard.next();

}while(!word.equals("done"));

Next time note what language you are distributing programming with :)

8 0
3 years ago
Other questions:
  • What is a way to Procter your social security number and other sensitive information from identity theft
    9·1 answer
  • Which option correctly describes a DBMS application? A. software used to manage databases B. software used to organize files and
    7·2 answers
  • What is the full word of"VPN"?​
    15·2 answers
  • A ___________ is similar to Computer Integrated Manufacturing, but is based much more on standard reusable application software
    5·1 answer
  • Suppose testcircle1 and circle1 in listing 9.1 are in two separate files named testcircle1.java and circle1.java, respectively.
    14·1 answer
  • Distinguish between the savings and investment options.
    8·1 answer
  • Maria is creating a program where the user will enter their name to begin. What kind of variable should be used for the user’s n
    15·2 answers
  • Write the functions of F1 to F12 on the keyboard​
    5·2 answers
  • Need help ASAP.<br> I am so lost.
    5·1 answer
  • What dictionary operation can you use to remove all the keys within the dictionary-named contacts?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!